Michael Huth
Michael Huth
Professor of Computer Science, Computing, Imperial College London
Bekræftet mail på imperial.ac.uk
Citeret af
Citeret af
Logic in Computer Science: Modelling and reasoning about systems
M Huth, M Ryan
Cambridge university press, 2004
Modal transition systems: A foundation for three-valued program analysis
M Huth, R Jagadeesan, D Schmidt
European Symposium on Programming, 155-169, 2001
Abstraction-based model checking using modal transition systems
P Godefroid, M Huth, R Jagadeesan
International conference on concurrency theory, 426-440, 2001
Quantitative analysis and model checking
M Huth, M Kwiatkowska
Proceedings of Twelfth Annual IEEE Symposium on Logic in Computer Science …, 1997
Assume-guarantee model checking of software: A comparative case study
CS Păsăreanu, MB Dwyer, M Huth
International SPIN Workshop on Model Checking of Software, 168-183, 1999
Relationship-based access control: its expression and enforcement through hybrid logic
G Bruns, PWL Fong, I Siahaan, M Huth
Proceedings of the second ACM conference on Data and Application Security …, 2012
A simple and expressive semantic framework for policy composition in access control
G Bruns, DS Dantas, M Huth
Proceedings of the 2007 ACM workshop on Formal methods in security …, 2007
Access control via Belnap logic: Intuitive, expressive, and analyzable policy composition
G Bruns, M Huth
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-27, 2011
20 years of modal and mixed specifications
A Antonik, M Huth, KG Larsen, U Nyman, A Wasowski
Bulletin of the European Association for Theoretical Computer Science, 2008
Access-control policies via Belnap logic: Effective and efficient composition and analysis
G Bruns, M Huth
2008 21st IEEE Computer Security Foundations Symposium, 163-176, 2008
Model checking vs. generalized model checking: Semantic minimizations for temporal logics
P Godefroid, M Huth
20th Annual IEEE Symposium on Logic in Computer Science (LICS'05), 158-167, 2005
Complexity of decision problems for mixed and modal specifications
A Antonik, M Huth, KG Larsen, U Nyman, A Wąsowski
International Conference on Foundations of Software Science and …, 2008
Towards an access-control framework for countering insider threats
J Crampton, M Huth
Insider Threats in Cyber Security, 173-195, 2010
On finite-state approximants for probabilistic computation tree logic
M Huth
Theoretical Computer Science 346 (1), 113-134, 2005
A domain equation for refinement of partial systems
MRA Huth, R Jagadeesan, DA Schmidt
Mathematical Structures in Computer Science 14 (4), 469-505, 2004
An authorization framework resilient to policy evaluation failures
J Crampton, M Huth
European Symposium on Research in Computer Security, 472-487, 2010
On model checking multiple hybrid views
A Hussain, M Huth
Proceedings of 1st international symposium on leveraging applications of …, 2004
Secure communicating systems: design, analysis, and implementation
M Huth, MRA Huth
Cambridge University Press, 2001
Model checking modal transition systems using Kripke structures
M Huth
International Workshop on Verification, Model Checking, and Abstract …, 2002
Linear domains and linear maps
M Huth
International Conference on Mathematical Foundations of Programming …, 1993
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20